Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Simple finite-state fault detectors for communication networks., , and . IEEE Trans. Commun., 40 (3): 477-479 (1992)Efficient Management of Time-Evolving Databases., , and . IEEE Trans. Knowl. Data Eng., 7 (4): 591-608 (1995)Nonintrusive appliance load monitoring.. Proc. IEEE, 80 (12): 1870-1891 (1992)Reconfiguration Algorithms for Rearrangeable Lightwave Networks., , and . INFOCOM, page 2205-2214. IEEE Computer Society, (1992)Automatic Alarm Correlation for Fault Identification., and . INFOCOM, page 553-561. IEEE Computer Society, (1995)An Algorithm for Constructing 3D Struts.. J. Comput. Sci. Technol., 24 (1): 56-64 (2009)Fault identification using a finite state machine model with unreliable partially observed data sequences., , and . IEEE Trans. Commun., 41 (7): 1074-1083 (1993)Memoryless nonlinear system identification with unknown model order., and . IEEE Trans. Inf. Theory, 37 (5): 1440-1450 (1991)Optimally Managing the History of an Evolving Forest., , and . SIGAL International Symposium on Algorithms, volume 450 of Lecture Notes in Computer Science, page 468-478. Springer, (1990)To Decode Short Cryptograms.. Commun. ACM, 37 (9): 102-108 (1994)